Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

new(rules): add umount macro #45

Merged
merged 2 commits into from
Apr 4, 2023
Merged

Conversation

incertum
Copy link
Contributor

@incertum incertum commented Apr 1, 2023

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind bug

/kind cleanup

/kind design

/kind documentation

/kind failing-test

/kind feature

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area rules

/area registry

/area build

/area documentation

What this PR does / why we need it:

add new umount macro

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

Signed-off-by: incertum <melissa.kilby.oss@gmail.com>
@poiana poiana added dco-signoff: yes kind/feature New feature or request labels Apr 1, 2023
@poiana poiana requested a review from darryk10 April 1, 2023 05:05
@poiana poiana requested a review from Kaizhe April 1, 2023 05:05
@poiana poiana added the size/XS label Apr 1, 2023
@@ -74,6 +74,11 @@
- macro: modify
condition: (rename or remove)

# %evt.arg.flags available for evt.dir=>, but only for umount2
# %evt.arg.name is path and available for evt.dir=<
- macro: umount
Copy link
Member

@loresuso loresuso Apr 3, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is this for an upcoming rule or for addressing falcosecurity/falco#2443 (comment)? in that case, do we want macros also for the other involved event types (e.g pipe,pipe2) already put in place?

@jasondellaluce
Copy link
Contributor

My only concern of adding macros that are not used in rules is that Falco will return the "XXX macro is not used" warning when processing the ruleset for validation.

@Andreagit97
Copy link
Member

Agree with Jason here, we could comment it and leave it as a hint for users, WDYT?

keep in rules as hint for end users

Co-authored-by: Jason Dellaluce <jasondellaluce@gmail.com>
Co-authored-by: Andrea Terzolo <andrea.terzolo@polito.it>
Signed-off-by: incertum <melissa.kilby.oss@gmail.com>
Copy link
Contributor

@jasondellaluce jasondellaluce left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@poiana
Copy link

poiana commented Apr 4, 2023

LGTM label has been added.

Git tree hash: 3a51bc6d2713a4f4e3c9b15672497070d5fe086f

@poiana
Copy link

poiana commented Apr 4, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: incertum, jasondellaluce

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana added the approved label Apr 4, 2023
@poiana poiana merged commit 5857874 into falcosecurity:main Apr 4, 2023
@jasondellaluce jasondellaluce added this to the falco-rules-1.0.0 milestone Jun 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants